First published: Sun Aug 10 2008(Updated: )
The CAPTCHA implementation in (1) Pligg 9.9.5 and possibly (2) Francisco Burzi PHP-Nuke 8.1 provides a critical random number (the ts_random value) within the URL in the SRC attribute of an IMG element, which allows remote attackers to pass the CAPTCHA test via a calculation that combines this value with the current date and the HTTP User-Agent string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Php-nuke Php-nuke | =8.1 | |
Pligg Pligg | =9.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.